Filters
total: 4049
-
Catalog
- Publications 2441 available results
- Journals 368 available results
- Conferences 202 available results
- Publishing Houses 1 available results
- People 311 available results
- Projects 14 available results
- Laboratories 1 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 148 available results
- Events 6 available results
- Open Research Data 555 available results
displaying 1000 best results Help
Search results for: COMPUTER SECURITY LABORATORY
-
On UMTS security.
PublicationW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Utilization of fuzzy rules in computer character animation
PublicationThe chapter presents a method for automatic enhancement of computer character animation utilizing fuzzy inference. First the user designs a prototype version of animation, with keyframes only for important poses, roughly describing the action. Then animation is enriched with new motion phases calculated by the fuzzy inference system using descriptors given by the user. Various degrees of motion fluency and naturalness are possible...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Internal Security
Journals -
Laboratory assessment of permeability of sand and biopolymer mixtures
PublicationLaboratory assessment of permeability of sand and biopolymer mixtures. This research presents a method of creating seepage barriers in a sandy soil using biopolymer additives (biosubstance), which consist of polysaccharides and water. Polysaccharides strongly interact with water to produce a viscous suspension. The paper aims to investigate the infl uence of a biosubstance employed in a highly permeable sandy soil. Amount of the...
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Deep Instance Segmentation of Laboratory Animals in Thermal Images
PublicationIn this paper we focus on the role of deep instance segmentation of laboratory rodents in thermal images. Thermal imaging is very suitable to observe the behaviour of laboratory animals, especially in low light conditions. It is an non-intrusive method allowing to monitor the activity of animals and potentially observe some physiological changes expressed in dynamic thermal patterns. The analysis of the recorded sequence of thermal...
-
Uncertainty assessment in the safety and security oriented risk analyses
PublicationW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Heuristic scheduling algorithms for uniform load of computer system
PublicationW pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...
-
ASON/GMPLS connection control servers in virtual computer environment
PublicationIn the paper ASON/GMPLS connection control servers layer in the context of Next Generation Network (NGN) is described. The implementation of ASON/GMPLS connection control servers in virtual computer environment as well as performed measurements are presented. Some aspects of virtual environment installation are depicted. Remarks regarding application of the virtual computer environment to realization of communication between NGN...
-
An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body
PublicationIn the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...
-
3D Computer Model of the Hip Joint Cartilage
PublicationThis paper presents 3D computer model of the hip joint cartilage in the ANSYS program. Model is made on the basis of anatomy and collected data on the material constants of bone and cartilage components. Analysis and comparison of biochemical model, viscoelastic and molecular mixed - aggregation serves to facilitate the creation of the next model of reality, which could be used in the design of joint prostheses. The correctness...
-
Metabolomics for laboratory diagnostics
Publication -
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Computer Supported Analysis of the Human Body Surface Area
PublicationRecent scientific studies show the growing importance of the coefficients: BSA and TBSA, as an alternative to the widely used BMI. The relevant indicators are widely used in medicine, including such areas as: the treatment of burns, chemotherapy, dermatology and toxicology; as benchmarks when calculating doses of drugs and fluids. The particular problems concerning this subject are: the change of the reference parameter value which...
-
Controlling computer by lip gestures employing neural network
PublicationResults of experiments regarding lip gesture recognition with an artificial neural network are discussed. The neural network module forms the core element of a multimodal human-computer interface called LipMouse. This solution allows a user to work on a computer using lip movements and gestures. A user face is detected in a video stream from a standard web camera using a cascade of boosted classifiers working with Haar-like features....
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublicationThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Investigation of Acoustic Properties of Poroelastic Asphalt Mixtures in Laboratory and Field Conditions
PublicationMeasures for the improvement of acoustic conditions in the vicinity of roads include the construction of pavement structures with low-noise surfaces with optimal macrotexture and the highest possible sound absorption coefficient. Laboratory evaluation of acoustic properties of a designed asphalt mixture before its placement in the pavement is a good solution. Currently, the most popular method for the determination of the sound...
-
Harmonics produced by traction substations – computer modelling and experimental verification
PublicationVoltage and current harmonics have a detrimental effect on the components of a power system. Current harmonics may result in the overload and damage to power transformers. Voltage harmonics may result in, for example, damage to capacitor banks used to compensate reactive power. Devices which contribute to both current and voltage distortion include traction rectifiers. This paper presents results of the computer investigation of...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness
e-Learning Courses -
Determination of the shape of the CFGFT cylindrical column based on laboratory tests
PublicationAnalyses were carried out on glass-fibre-reinforced polymer tube columns with reference to laboratory tests. The angles of the glass fibre beams were 20◦, 55◦ and 85◦. The study employed non-classical operational calculus. Various modulated harmonic signal shapes were considered for columns and tubes at buckling. The buckling loads were assessed and compared for different models.
-
Biochemistry - Laboratory exercises
e-Learning CoursesExerise 1. The ability to accumulate metal cations by edible mushrooms, comparison with edible plants Exercise 2. Measurement of activity of glutathione S-transferases - the detoxifying enzymes present in the cytosol of eukaryotic cells Exercise 3. Cell membranes permeability Exercise 4. Detection of mutagenic substances using Ames test Exercise 5. Gluten content in food products part 1. Exercise 6. Gluten content in food...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publication -
Computer controlled systems - 2022/2023
e-Learning Coursesmateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...
-
Deep learning based thermal image segmentation for laboratory animals tracking
PublicationAutomated systems for behaviour classification of laboratory animals are an attractive alternative to manual scoring. However, the proper animals separation and tracking, especially when they are in close contact, is the bottleneck of the behaviour analysis systems. In this paper, we propose a method for the segmentation of thermal images of laboratory rats that are in close contact during social behaviour tests. For this, we are...
-
Integrated controller for ultra high frequency technique laboratory
PublicationDepartment of Microwave and Antenna Engineering decided to modernize the laboratory of Ultra High Frequency Techniques. The main change was to replace measurement of the field distribution inside rectangular waveguides by analysing the fields around striplines. This involved the need to overcome several technical and conceptual problems. Precise positioning of the probe and reading the field distribution near the stripline is important...
-
Social media and efficient computer infrastructure in smart city
PublicationSocial media require an efficient infrastructures of computer and communication systems to support a smart city. In a big city, there are several crucial dilemmas with a home and public space planning, a growing population, a global warming, carbon emissions, a lack of key resources like water and energy, and a traffic congestion. In a smart city, we expect an efficient and sustainable transportation, efficient management of resources...
-
Adaptive acoustic crosstalk cancellation in mobile computer device
PublicationThe cancellation of acoustic crosstalk is employed to enhance the stereo image in mobile listening conditions. A practical setup employing a mobile computer is employed. The adaptation of the crosstalk cancellation filter to the position of the listener's head is featured. The measurement evaluating the possibility of practical application of the method are described. The head and torso simulator was used for measurements. The...
-
Security and knowledge management
PublicationOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublicationArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
MECHANICAL PROPERTIES OF BOTTOM ASH – DREDGED MATERIAL MIXTURES IN LABORATORY TESTS
PublicationBottom ash from EC Gdańsk and dredged material taken from the mouth of The Vistula were mixed to form an engineering material used for dike construction. Mixtures with different bottom ash content were tested in laboratory to determine its basic physical and mechanical properties. The optimum bottom ash–dredged material mixture, built in the corps of the test dike, contains 70% of ash. The optimum bottom ash content in the mixture...
-
Portable raman spectrometer for maritime security applications
PublicationThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is widely used for fast identification of various chemicals. Continuous progress in the field of photonics has resulted in commercial availability of low-power compact Raman spectrometers which can be integrated into portable systems....
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Essentials of computer science for Bachelor in Management students
e-Learning CoursesVarious resources accompanying "Essentials of computer science" classes for Bachelor in Management 1st year students.
-
Gesture-based computer control system applied to the interactive whiteboard
PublicationIn the paper the gesture-based computer control system coupled with the dedicated touchless interactive whiteboard is presented. The system engineered enables a user to control any top-most computer application by using one or both hands gestures. First, a review of gesture recognition applications with a focus on methods and algorithms applied is given. Hardware and software solution of the system consisting of a PC, camera, multimedia...
-
Gesture-based computer control system applied to the interactive whiteboard
PublicationIn the paper the gesture-based computer control system coupled with the dedicated touchless interactive whiteboard is presented. The system engineered enables a user to control any top-most computer application by using one or both hands gestures. First, a review of gesture recognition applications with a focus on methods and algorithms applied is given. Hardware and software solution of the system consisting of a PC, camera, multimedia...
-
Blended Learning Model for Computer Techniques for Students of Architecture
PublicationAbstract: The article summarizes two-year experience of implementing hybrid formula for teaching Computer Techniques at the Faculty of Architecture at the Gdansk University of Technology. Original educational e-materials, consisting of video clips, text and graphics instructions, as well as links to online resources are embedded in the university e-learning educational platform. The author discusses technical constraints associated...
-
New Applications of Multimodal Human-Computer Interfaces
PublicationMultimodal computer interfaces and examples of their applications to education software and for the disabled people are presented. The proposed interfaces include the interactive electronic whiteboard based on video image analysis, application for controlling computers with gestures and the audio interface for speech stretching for hearing impaired and stuttering people. Application of the eye-gaze tracking system to awareness...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Clinical Laboratory
Journals -
Laboratory Phonology
Journals -
LABORATORY ANIMALS
Journals -
Paweł Czarnul dr hab. inż.
PeoplePaweł Czarnul obtained a D.Sc. degree in computer science in 2015, a Ph.D. in computer science granted by a council at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology in 2003. His research interests include:parallel and distributed processing including clusters, accelerators, coprocessors; distributed information systems; architectures of distributed systems; programming mobile devices....
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Computer Support of Analysis of Optical Spectra Measurements
PublicationThe verification of measurement errors has a big impact on the assessment of the accuracy of conducted measurements and obtained results. In many cases, computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with a Fabry–Perot interferometer working in the transmission mode. In the measurement setup, a...
-
Computer support of analysis optical spectra measurements
PublicationVerification of measurement errors has a big impact on assessment of accuracy of conducted measurements and obtained results. In many cases computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with Fabry-Perot interferometer working in the transmission mode. In measurement setup, a 1310 nm superluminescent...